Evasion Techniques for VM-based Black-Box Software Analysis

2022 IEEE International Workshop on Metrology for Industry 4.0 & IoT (MetroInd4.0&IoT)(2022)

引用 0|浏览3
暂无评分
摘要
One of the great challenges in the process of black-box testing is the fact that it's possible for an application to hide malicious behavior after detecting the presence of a hypervisor. In this paper, we demonstrate the main virtualization detection mechanisms in the Linux environment and propose an environment meant to prevent hypervisor detection. The created environment consists of a Linux virtual machine and a Linux container that is created directly in the host machine. After that, an application is executed inside the virtual machine and from within a container whose files were imported into the guest machine through the network. The tools libvirt, KVM and QEMU were used for system virtualization, container technologies (chroot, Docker, LXC, systemd-nspawn) were used to create an isolated environment, the OpenSUSE, Manjaro and Arch Linux distributions were used for virtualization and the 9p protocol was used to create a network bridge between the guest and host systems.
更多
查看译文
关键词
9p,artifacts,black-box software analysis containers,CPUID,detection,Docker,hypervisor,KVM,LXC,QEMU,systemd,virtualization
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要